chiark / gitweb /
socket: SELinux support for socket creation.
[elogind.git] / src / socket.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <sys/types.h>
23 #include <sys/stat.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <fcntl.h>
27 #include <sys/epoll.h>
28 #include <signal.h>
29 #include <arpa/inet.h>
30 #include <selinux/selinux.h>
31
32 #include "unit.h"
33 #include "socket.h"
34 #include "log.h"
35 #include "load-dropin.h"
36 #include "load-fragment.h"
37 #include "strv.h"
38 #include "unit-name.h"
39 #include "dbus-socket.h"
40 #include "missing.h"
41 #include "special.h"
42 #include "bus-errors.h"
43
44 static const UnitActiveState state_translation_table[_SOCKET_STATE_MAX] = {
45         [SOCKET_DEAD] = UNIT_INACTIVE,
46         [SOCKET_START_PRE] = UNIT_ACTIVATING,
47         [SOCKET_START_POST] = UNIT_ACTIVATING,
48         [SOCKET_LISTENING] = UNIT_ACTIVE,
49         [SOCKET_RUNNING] = UNIT_ACTIVE,
50         [SOCKET_STOP_PRE] = UNIT_DEACTIVATING,
51         [SOCKET_STOP_PRE_SIGTERM] = UNIT_DEACTIVATING,
52         [SOCKET_STOP_PRE_SIGKILL] = UNIT_DEACTIVATING,
53         [SOCKET_STOP_POST] = UNIT_DEACTIVATING,
54         [SOCKET_FINAL_SIGTERM] = UNIT_DEACTIVATING,
55         [SOCKET_FINAL_SIGKILL] = UNIT_DEACTIVATING,
56         [SOCKET_MAINTENANCE] = UNIT_MAINTENANCE
57 };
58
59 static void socket_init(Unit *u) {
60         Socket *s = SOCKET(u);
61
62         assert(u);
63         assert(u->meta.load_state == UNIT_STUB);
64
65         s->backlog = SOMAXCONN;
66         s->timeout_usec = DEFAULT_TIMEOUT_USEC;
67         s->directory_mode = 0755;
68         s->socket_mode = 0666;
69
70         s->max_connections = 64;
71
72         s->priority = -1;
73         s->ip_tos = -1;
74         s->ip_ttl = -1;
75         s->mark = -1;
76
77         exec_context_init(&s->exec_context);
78
79         s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
80 }
81
82 static void socket_unwatch_control_pid(Socket *s) {
83         assert(s);
84
85         if (s->control_pid <= 0)
86                 return;
87
88         unit_unwatch_pid(UNIT(s), s->control_pid);
89         s->control_pid = 0;
90 }
91
92 static void socket_done(Unit *u) {
93         Socket *s = SOCKET(u);
94         SocketPort *p;
95         Meta *i;
96
97         assert(s);
98
99         while ((p = s->ports)) {
100                 LIST_REMOVE(SocketPort, port, s->ports, p);
101
102                 if (p->fd >= 0) {
103                         unit_unwatch_fd(UNIT(s), &p->fd_watch);
104                         close_nointr_nofail(p->fd);
105                 }
106
107                 free(p->path);
108                 free(p);
109         }
110
111         exec_context_done(&s->exec_context);
112         exec_command_free_array(s->exec_command, _SOCKET_EXEC_COMMAND_MAX);
113         s->control_command = NULL;
114
115         socket_unwatch_control_pid(s);
116
117         s->service = NULL;
118
119         free(s->bind_to_device);
120         s->bind_to_device = NULL;
121
122         unit_unwatch_timer(u, &s->timer_watch);
123
124         /* Make sure no service instance refers to us anymore. */
125         LIST_FOREACH(units_per_type, i, u->meta.manager->units_per_type[UNIT_SERVICE]) {
126                 Service *service = (Service *) i;
127
128                 if (service->socket == s)
129                         service->socket = NULL;
130         }
131 }
132
133 static int socket_instantiate_service(Socket *s) {
134         char *prefix, *name;
135         int r;
136         Unit *u;
137
138         assert(s);
139
140         /* This fills in s->service if it isn't filled in yet. For
141          * Accept=yes sockets we create the next connection service
142          * here. For Accept=no this is mostly a NOP since the service
143          * is figured out at load time anyway. */
144
145         if (s->service)
146                 return 0;
147
148         assert(s->accept);
149
150         if (!(prefix = unit_name_to_prefix(s->meta.id)))
151                 return -ENOMEM;
152
153         r = asprintf(&name, "%s@%u.service", prefix, s->n_accepted);
154         free(prefix);
155
156         if (r < 0)
157                 return -ENOMEM;
158
159         r = manager_load_unit(s->meta.manager, name, NULL, NULL, &u);
160         free(name);
161
162         if (r < 0)
163                 return r;
164
165         s->service = SERVICE(u);
166         return 0;
167 }
168
169 static bool have_non_accept_socket(Socket *s) {
170         SocketPort *p;
171
172         assert(s);
173
174         if (!s->accept)
175                 return true;
176
177         LIST_FOREACH(port, p, s->ports) {
178
179                 if (p->type != SOCKET_SOCKET)
180                         return true;
181
182                 if (!socket_address_can_accept(&p->address))
183                         return true;
184         }
185
186         return false;
187 }
188
189 static int socket_verify(Socket *s) {
190         assert(s);
191
192         if (s->meta.load_state != UNIT_LOADED)
193                 return 0;
194
195         if (!s->ports) {
196                 log_error("%s lacks Listen setting. Refusing.", s->meta.id);
197                 return -EINVAL;
198         }
199
200         if (s->accept && have_non_accept_socket(s)) {
201                 log_error("%s configured for accepting sockets, but sockets are non-accepting. Refusing.", s->meta.id);
202                 return -EINVAL;
203         }
204
205         if (s->accept && s->max_connections <= 0) {
206                 log_error("%s's MaxConnection setting too small. Refusing.", s->meta.id);
207                 return -EINVAL;
208         }
209
210         if (s->exec_context.pam_name && s->exec_context.kill_mode != KILL_CONTROL_GROUP) {
211                 log_error("%s has PAM enabled. Kill mode must be set to 'control-group'. Refusing.", s->meta.id);
212                 return -EINVAL;
213         }
214
215         return 0;
216 }
217
218 static bool socket_needs_mount(Socket *s, const char *prefix) {
219         SocketPort *p;
220
221         assert(s);
222
223         LIST_FOREACH(port, p, s->ports) {
224
225                 if (p->type == SOCKET_SOCKET) {
226                         if (socket_address_needs_mount(&p->address, prefix))
227                                 return true;
228                 } else {
229                         assert(p->type == SOCKET_FIFO);
230                         if (path_startswith(p->path, prefix))
231                                 return true;
232                 }
233         }
234
235         return false;
236 }
237
238 int socket_add_one_mount_link(Socket *s, Mount *m) {
239         int r;
240
241         assert(s);
242         assert(m);
243
244         if (s->meta.load_state != UNIT_LOADED ||
245             m->meta.load_state != UNIT_LOADED)
246                 return 0;
247
248         if (!socket_needs_mount(s, m->where))
249                 return 0;
250
251         if ((r = unit_add_two_dependencies(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, UNIT(m), true)) < 0)
252                 return r;
253
254         return 0;
255 }
256
257 static int socket_add_mount_links(Socket *s) {
258         Meta *other;
259         int r;
260
261         assert(s);
262
263         LIST_FOREACH(units_per_type, other, s->meta.manager->units_per_type[UNIT_MOUNT])
264                 if ((r = socket_add_one_mount_link(s, (Mount*) other)) < 0)
265                         return r;
266
267         return 0;
268 }
269
270 static int socket_add_device_link(Socket *s) {
271         char *t;
272         int r;
273
274         assert(s);
275
276         if (!s->bind_to_device)
277                 return 0;
278
279         if (asprintf(&t, "/sys/subsystem/net/devices/%s", s->bind_to_device) < 0)
280                 return -ENOMEM;
281
282         r = unit_add_node_link(UNIT(s), t, false);
283         free(t);
284
285         return r;
286 }
287
288 static int socket_add_default_dependencies(Socket *s) {
289         int r;
290         assert(s);
291
292         if (s->meta.manager->running_as == MANAGER_SYSTEM)
293                 if ((r = unit_add_two_dependencies_by_name(UNIT(s), UNIT_AFTER, UNIT_REQUIRES, SPECIAL_SYSINIT_TARGET, NULL, true)) < 0)
294                         return r;
295
296         return unit_add_two_dependencies_by_name(UNIT(s), UNIT_BEFORE, UNIT_CONFLICTS, SPECIAL_SHUTDOWN_TARGET, NULL, true);
297 }
298
299 static int socket_load(Unit *u) {
300         Socket *s = SOCKET(u);
301         int r;
302
303         assert(u);
304         assert(u->meta.load_state == UNIT_STUB);
305
306         if ((r = unit_load_fragment_and_dropin(u)) < 0)
307                 return r;
308
309         /* This is a new unit? Then let's add in some extras */
310         if (u->meta.load_state == UNIT_LOADED) {
311
312                 if (have_non_accept_socket(s)) {
313                         if ((r = unit_load_related_unit(u, ".service", (Unit**) &s->service)) < 0)
314                                 return r;
315
316                         if ((r = unit_add_dependency(u, UNIT_BEFORE, UNIT(s->service), true)) < 0)
317                                 return r;
318                 }
319
320                 if ((r = socket_add_mount_links(s)) < 0)
321                         return r;
322
323                 if ((r = socket_add_device_link(s)) < 0)
324                         return r;
325
326                 if ((r = unit_add_exec_dependencies(u, &s->exec_context)) < 0)
327                         return r;
328
329                 if ((r = unit_add_default_cgroup(u)) < 0)
330                         return r;
331
332                 if (s->meta.default_dependencies)
333                         if ((r = socket_add_default_dependencies(s)) < 0)
334                                 return r;
335         }
336
337         return socket_verify(s);
338 }
339
340 static const char* listen_lookup(int type) {
341
342         if (type == SOCK_STREAM)
343                 return "ListenStream";
344         else if (type == SOCK_DGRAM)
345                 return "ListenDatagram";
346         else if (type == SOCK_SEQPACKET)
347                 return "ListenSequentialPacket";
348
349         assert_not_reached("Unknown socket type");
350         return NULL;
351 }
352
353 static void socket_dump(Unit *u, FILE *f, const char *prefix) {
354
355         SocketExecCommand c;
356         Socket *s = SOCKET(u);
357         SocketPort *p;
358         const char *prefix2;
359         char *p2;
360
361         assert(s);
362         assert(f);
363
364         p2 = strappend(prefix, "\t");
365         prefix2 = p2 ? p2 : prefix;
366
367         fprintf(f,
368                 "%sSocket State: %s\n"
369                 "%sBindIPv6Only: %s\n"
370                 "%sBacklog: %u\n"
371                 "%sSocketMode: %04o\n"
372                 "%sDirectoryMode: %04o\n"
373                 "%sKeepAlive: %s\n"
374                 "%sFreeBind: %s\n",
375                 prefix, socket_state_to_string(s->state),
376                 prefix, socket_address_bind_ipv6_only_to_string(s->bind_ipv6_only),
377                 prefix, s->backlog,
378                 prefix, s->socket_mode,
379                 prefix, s->directory_mode,
380                 prefix, yes_no(s->keep_alive),
381                 prefix, yes_no(s->free_bind));
382
383         if (s->control_pid > 0)
384                 fprintf(f,
385                         "%sControl PID: %lu\n",
386                         prefix, (unsigned long) s->control_pid);
387
388         if (s->bind_to_device)
389                 fprintf(f,
390                         "%sBindToDevice: %s\n",
391                         prefix, s->bind_to_device);
392
393         if (s->accept)
394                 fprintf(f,
395                         "%sAccepted: %u\n"
396                         "%sNConnections: %u\n"
397                         "%sMaxConnections: %u\n",
398                         prefix, s->n_accepted,
399                         prefix, s->n_connections,
400                         prefix, s->max_connections);
401
402         if (s->priority >= 0)
403                 fprintf(f,
404                         "%sPriority: %i\n",
405                         prefix, s->priority);
406
407         if (s->receive_buffer > 0)
408                 fprintf(f,
409                         "%sReceiveBuffer: %zu\n",
410                         prefix, s->receive_buffer);
411
412         if (s->send_buffer > 0)
413                 fprintf(f,
414                         "%sSendBuffer: %zu\n",
415                         prefix, s->send_buffer);
416
417         if (s->ip_tos >= 0)
418                 fprintf(f,
419                         "%sIPTOS: %i\n",
420                         prefix, s->ip_tos);
421
422         if (s->ip_ttl >= 0)
423                 fprintf(f,
424                         "%sIPTTL: %i\n",
425                         prefix, s->ip_ttl);
426
427         if (s->pipe_size > 0)
428                 fprintf(f,
429                         "%sPipeSize: %zu\n",
430                         prefix, s->pipe_size);
431
432         if (s->mark >= 0)
433                 fprintf(f,
434                         "%sMark: %i\n",
435                         prefix, s->mark);
436
437         LIST_FOREACH(port, p, s->ports) {
438
439                 if (p->type == SOCKET_SOCKET) {
440                         const char *t;
441                         int r;
442                         char *k;
443
444                         if ((r = socket_address_print(&p->address, &k)) < 0)
445                                 t = strerror(-r);
446                         else
447                                 t = k;
448
449                         fprintf(f, "%s%s: %s\n", prefix, listen_lookup(p->address.type), k);
450                         free(k);
451                 } else
452                         fprintf(f, "%sListenFIFO: %s\n", prefix, p->path);
453         }
454
455         exec_context_dump(&s->exec_context, f, prefix);
456
457         for (c = 0; c < _SOCKET_EXEC_COMMAND_MAX; c++) {
458                 if (!s->exec_command[c])
459                         continue;
460
461                 fprintf(f, "%s-> %s:\n",
462                         prefix, socket_exec_command_to_string(c));
463
464                 exec_command_dump_list(s->exec_command[c], f, prefix2);
465         }
466
467         free(p2);
468 }
469
470 static int instance_from_socket(int fd, unsigned nr, char **instance) {
471         socklen_t l;
472         char *r;
473         union {
474                 struct sockaddr sa;
475                 struct sockaddr_un un;
476                 struct sockaddr_in in;
477                 struct sockaddr_in6 in6;
478                 struct sockaddr_storage storage;
479         } local, remote;
480
481         assert(fd >= 0);
482         assert(instance);
483
484         l = sizeof(local);
485         if (getsockname(fd, &local.sa, &l) < 0)
486                 return -errno;
487
488         l = sizeof(remote);
489         if (getpeername(fd, &remote.sa, &l) < 0)
490                 return -errno;
491
492         switch (local.sa.sa_family) {
493
494         case AF_INET: {
495                 uint32_t
496                         a = ntohl(local.in.sin_addr.s_addr),
497                         b = ntohl(remote.in.sin_addr.s_addr);
498
499                 if (asprintf(&r,
500                              "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
501                              a >> 24, (a >> 16) & 0xFF, (a >> 8) & 0xFF, a & 0xFF,
502                              ntohs(local.in.sin_port),
503                              b >> 24, (b >> 16) & 0xFF, (b >> 8) & 0xFF, b & 0xFF,
504                              ntohs(remote.in.sin_port)) < 0)
505                         return -ENOMEM;
506
507                 break;
508         }
509
510         case AF_INET6: {
511                 static const char ipv4_prefix[] = {
512                         0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0xFF, 0xFF
513                 };
514
515                 if (memcmp(&local.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0 &&
516                     memcmp(&remote.in6.sin6_addr, ipv4_prefix, sizeof(ipv4_prefix)) == 0) {
517                         const uint8_t
518                                 *a = local.in6.sin6_addr.s6_addr+12,
519                                 *b = remote.in6.sin6_addr.s6_addr+12;
520
521                         if (asprintf(&r,
522                                      "%u.%u.%u.%u:%u-%u.%u.%u.%u:%u",
523                                      a[0], a[1], a[2], a[3],
524                                      ntohs(local.in6.sin6_port),
525                                      b[0], b[1], b[2], b[3],
526                                      ntohs(remote.in6.sin6_port)) < 0)
527                                 return -ENOMEM;
528                 } else {
529                         char a[INET6_ADDRSTRLEN], b[INET6_ADDRSTRLEN];
530
531                         if (asprintf(&r,
532                                      "%s:%u-%s:%u",
533                                      inet_ntop(AF_INET6, &local.in6.sin6_addr, a, sizeof(a)),
534                                      ntohs(local.in6.sin6_port),
535                                      inet_ntop(AF_INET6, &remote.in6.sin6_addr, b, sizeof(b)),
536                                      ntohs(remote.in6.sin6_port)) < 0)
537                                 return -ENOMEM;
538                 }
539
540                 break;
541         }
542
543         case AF_UNIX: {
544                 struct ucred ucred;
545
546                 l = sizeof(ucred);
547                 if (getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &ucred, &l) < 0)
548                         return -errno;
549
550                 if (asprintf(&r,
551                              "%u-%lu-%lu",
552                              nr,
553                              (unsigned long) ucred.pid,
554                              (unsigned long) ucred.uid) < 0)
555                         return -ENOMEM;
556
557                 break;
558         }
559
560         default:
561                 assert_not_reached("Unhandled socket type.");
562         }
563
564         *instance = r;
565         return 0;
566 }
567
568 static void socket_close_fds(Socket *s) {
569         SocketPort *p;
570
571         assert(s);
572
573         LIST_FOREACH(port, p, s->ports) {
574                 if (p->fd < 0)
575                         continue;
576
577                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
578                 close_nointr_nofail(p->fd);
579
580                 /* One little note: we should never delete any sockets
581                  * in the file system here! After all some other
582                  * process we spawned might still have a reference of
583                  * this fd and wants to continue to use it. Therefore
584                  * we delete sockets in the file system before we
585                  * create a new one, not after we stopped using
586                  * one! */
587
588                 p->fd = -1;
589         }
590 }
591
592 static void socket_apply_socket_options(Socket *s, int fd) {
593         assert(s);
594         assert(fd >= 0);
595
596         if (s->keep_alive) {
597                 int b = s->keep_alive;
598                 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &b, sizeof(b)) < 0)
599                         log_warning("SO_KEEPALIVE failed: %m");
600         }
601
602         if (s->priority >= 0)
603                 if (setsockopt(fd, SOL_SOCKET, SO_PRIORITY, &s->priority, sizeof(s->priority)) < 0)
604                         log_warning("SO_PRIORITY failed: %m");
605
606         if (s->receive_buffer > 0) {
607                 int value = (int) s->receive_buffer;
608                 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &value, sizeof(value)) < 0)
609                         log_warning("SO_RCVBUF failed: %m");
610         }
611
612         if (s->send_buffer > 0) {
613                 int value = (int) s->send_buffer;
614                 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &value, sizeof(value)) < 0)
615                         log_warning("SO_SNDBUF failed: %m");
616         }
617
618         if (s->mark >= 0)
619                 if (setsockopt(fd, SOL_SOCKET, SO_MARK, &s->mark, sizeof(s->mark)) < 0)
620                         log_warning("SO_MARK failed: %m");
621
622         if (s->ip_tos >= 0)
623                 if (setsockopt(fd, IPPROTO_IP, IP_TOS, &s->ip_tos, sizeof(s->ip_tos)) < 0)
624                         log_warning("IP_TOS failed: %m");
625
626         if (s->ip_ttl >= 0) {
627                 int r, x;
628
629                 r = setsockopt(fd, IPPROTO_IP, IP_TTL, &s->ip_ttl, sizeof(s->ip_ttl));
630                 x = setsockopt(fd, IPPROTO_IPV6, IPV6_UNICAST_HOPS, &s->ip_ttl, sizeof(s->ip_ttl));
631
632                 if (r < 0 && x < 0)
633                         log_warning("IP_TTL/IPV6_UNICAST_HOPS failed: %m");
634         }
635 }
636
637 static void socket_apply_fifo_options(Socket *s, int fd) {
638         assert(s);
639         assert(fd >= 0);
640
641         if (s->pipe_size > 0)
642                 if (fcntl(fd, F_SETPIPE_SZ, s->pipe_size) < 0)
643                         log_warning("F_SETPIPE_SZ: %m");
644 }
645
646 static int selinux_getconfromexe(
647                 const char *exe,
648                 security_context_t *newcon) {
649
650         security_context_t mycon = NULL, fcon = NULL;
651         security_class_t sclass;
652         int r = 0;
653
654         r = getcon(&mycon);
655         if (r < 0)
656                 goto fail;
657
658         r = getfilecon(exe, &fcon);
659         if (r < 0)
660                 goto fail;
661
662         sclass = string_to_security_class("process");
663         r = security_compute_create(mycon, fcon, sclass, newcon);
664
665 fail:
666         if (r < 0)
667                 r = -errno;
668
669         freecon(mycon);
670         freecon(fcon);
671         return r;
672 }
673
674 static int selinux_getfileconfrompath(
675                 const security_context_t scon,
676                 const char *path,
677                 const char *class,
678                 security_context_t *fcon) {
679
680         security_context_t dir_con = NULL;
681         security_class_t sclass;
682         int r = 0;
683
684         r = getfilecon(path, &dir_con);
685         if (r >= 0) {
686                 r = -1;
687                 if ((sclass = string_to_security_class(class)) != 0)
688                         r = security_compute_create(scon, dir_con, sclass, fcon);
689         }
690         if (r < 0)
691                 r = -errno;
692
693         freecon(dir_con);
694         return r;
695 }
696
697 static int fifo_address_create(
698                 const char *path,
699                 mode_t directory_mode,
700                 mode_t socket_mode,
701                 security_context_t scon,
702                 int *_fd) {
703
704         int fd = -1, r = 0;
705         struct stat st;
706         mode_t old_mask;
707         security_context_t filecon = NULL;
708
709         assert(path);
710         assert(_fd);
711
712         mkdir_parents(path, directory_mode);
713
714         if (scon) {
715                 if (scon && ((r = selinux_getfileconfrompath(scon, path, "fifo_file", &filecon)) == 0)) {
716                         r = setfscreatecon(filecon);
717
718                         if (r < 0) {
719                                 log_error("Failed to set SELinux file context (%s) on %s: %m", scon, path);
720                                 r = -errno;
721                         }
722
723                         freecon(filecon);
724                 }
725
726                 if (r < 0  && security_getenforce() == 1)
727                         goto fail;
728         }
729
730         /* Enforce the right access mode for the fifo */
731         old_mask = umask(~ socket_mode);
732
733         /* Include the original umask in our mask */
734         umask(~socket_mode | old_mask);
735
736         r = mkfifo(path, socket_mode);
737         umask(old_mask);
738
739         if (r < 0) {
740                 r = -errno;
741                 goto fail;
742         }
743
744         if ((fd = open(path, O_RDWR|O_CLOEXEC|O_NOCTTY|O_NONBLOCK|O_NOFOLLOW)) < 0) {
745                 r = -errno;
746                 goto fail;
747         }
748
749         setfscreatecon(NULL);
750
751         if (fstat(fd, &st) < 0) {
752                 r = -errno;
753                 goto fail;
754         }
755
756         if (!S_ISFIFO(st.st_mode) ||
757             (st.st_mode & 0777) != (socket_mode & ~old_mask) ||
758             st.st_uid != getuid() ||
759             st.st_gid != getgid()) {
760
761                 r = -EEXIST;
762                 goto fail;
763         }
764
765         *_fd = fd;
766         return 0;
767
768 fail:
769         setfscreatecon(NULL);
770         if (fd >= 0)
771                 close_nointr_nofail(fd);
772
773         return r;
774 }
775
776 static int socket_open_fds(Socket *s) {
777         SocketPort *p;
778         int r;
779         security_context_t scon = NULL;
780
781         assert(s);
782
783         if ((r = socket_instantiate_service(s)) < 0)
784                 return r;
785
786         if (selinux_getconfromexe(s->service->exec_command[SERVICE_EXEC_START]->path, &scon) < 0) {
787                 log_error("Failed to get SELinux exec context for %s \n", s->service->exec_command[SERVICE_EXEC_START]->path);
788                 if (security_getenforce() == 1)
789                         return -errno;
790         }
791
792         log_debug("SELinux Socket context for %s set to %s\n", s->service->exec_command[SERVICE_EXEC_START]->path, scon);
793         LIST_FOREACH(port, p, s->ports) {
794
795                 if (p->fd >= 0)
796                         continue;
797
798                 if (p->type == SOCKET_SOCKET) {
799
800                         if ((r = socket_address_listen(
801                                              &p->address,
802                                              s->backlog,
803                                              s->bind_ipv6_only,
804                                              s->bind_to_device,
805                                              s->free_bind,
806                                              s->directory_mode,
807                                              s->socket_mode,
808                                              scon,
809                                              &p->fd)) < 0)
810                                 goto rollback;
811
812                         socket_apply_socket_options(s, p->fd);
813
814                 } else  if (p->type == SOCKET_FIFO) {
815
816                         if ((r = fifo_address_create(
817                                              p->path,
818                                              s->directory_mode,
819                                              s->socket_mode,
820                                              scon,
821                                              &p->fd)) < 0)
822                                 goto rollback;
823
824                         socket_apply_fifo_options(s, p->fd);
825
826                 } else
827                         assert_not_reached("Unknown port type");
828         }
829
830         freecon(scon);
831         return 0;
832
833 rollback:
834         socket_close_fds(s);
835         freecon(scon);
836         return r;
837 }
838
839 static void socket_unwatch_fds(Socket *s) {
840         SocketPort *p;
841
842         assert(s);
843
844         LIST_FOREACH(port, p, s->ports) {
845                 if (p->fd < 0)
846                         continue;
847
848                 unit_unwatch_fd(UNIT(s), &p->fd_watch);
849         }
850 }
851
852 static int socket_watch_fds(Socket *s) {
853         SocketPort *p;
854         int r;
855
856         assert(s);
857
858         LIST_FOREACH(port, p, s->ports) {
859                 if (p->fd < 0)
860                         continue;
861
862                 p->fd_watch.socket_accept =
863                         s->accept &&
864                         p->type == SOCKET_SOCKET &&
865                         socket_address_can_accept(&p->address);
866
867                 if ((r = unit_watch_fd(UNIT(s), p->fd, EPOLLIN, &p->fd_watch)) < 0)
868                         goto fail;
869         }
870
871         return 0;
872
873 fail:
874         socket_unwatch_fds(s);
875         return r;
876 }
877
878 static void socket_set_state(Socket *s, SocketState state) {
879         SocketState old_state;
880         assert(s);
881
882         old_state = s->state;
883         s->state = state;
884
885         if (state != SOCKET_START_PRE &&
886             state != SOCKET_START_POST &&
887             state != SOCKET_STOP_PRE &&
888             state != SOCKET_STOP_PRE_SIGTERM &&
889             state != SOCKET_STOP_PRE_SIGKILL &&
890             state != SOCKET_STOP_POST &&
891             state != SOCKET_FINAL_SIGTERM &&
892             state != SOCKET_FINAL_SIGKILL) {
893                 unit_unwatch_timer(UNIT(s), &s->timer_watch);
894                 socket_unwatch_control_pid(s);
895                 s->control_command = NULL;
896                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
897         }
898
899         if (state != SOCKET_LISTENING)
900                 socket_unwatch_fds(s);
901
902         if (state != SOCKET_START_POST &&
903             state != SOCKET_LISTENING &&
904             state != SOCKET_RUNNING &&
905             state != SOCKET_STOP_PRE &&
906             state != SOCKET_STOP_PRE_SIGTERM &&
907             state != SOCKET_STOP_PRE_SIGKILL)
908                 socket_close_fds(s);
909
910         if (state != old_state)
911                 log_debug("%s changed %s -> %s",
912                           s->meta.id,
913                           socket_state_to_string(old_state),
914                           socket_state_to_string(state));
915
916         unit_notify(UNIT(s), state_translation_table[old_state], state_translation_table[state]);
917 }
918
919 static int socket_coldplug(Unit *u) {
920         Socket *s = SOCKET(u);
921         int r;
922
923         assert(s);
924         assert(s->state == SOCKET_DEAD);
925
926         if (s->deserialized_state != s->state) {
927
928                 if (s->deserialized_state == SOCKET_START_PRE ||
929                     s->deserialized_state == SOCKET_START_POST ||
930                     s->deserialized_state == SOCKET_STOP_PRE ||
931                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
932                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL ||
933                     s->deserialized_state == SOCKET_STOP_POST ||
934                     s->deserialized_state == SOCKET_FINAL_SIGTERM ||
935                     s->deserialized_state == SOCKET_FINAL_SIGKILL) {
936
937                         if (s->control_pid <= 0)
938                                 return -EBADMSG;
939
940                         if ((r = unit_watch_pid(UNIT(s), s->control_pid)) < 0)
941                                 return r;
942
943                         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
944                                 return r;
945                 }
946
947                 if (s->deserialized_state == SOCKET_START_POST ||
948                     s->deserialized_state == SOCKET_LISTENING ||
949                     s->deserialized_state == SOCKET_RUNNING ||
950                     s->deserialized_state == SOCKET_STOP_PRE ||
951                     s->deserialized_state == SOCKET_STOP_PRE_SIGTERM ||
952                     s->deserialized_state == SOCKET_STOP_PRE_SIGKILL)
953                         if ((r = socket_open_fds(s)) < 0)
954                                 return r;
955
956                 if (s->deserialized_state == SOCKET_LISTENING)
957                         if ((r = socket_watch_fds(s)) < 0)
958                                 return r;
959
960                 socket_set_state(s, s->deserialized_state);
961         }
962
963         return 0;
964 }
965
966 static int socket_spawn(Socket *s, ExecCommand *c, pid_t *_pid) {
967         pid_t pid;
968         int r;
969         char **argv;
970
971         assert(s);
972         assert(c);
973         assert(_pid);
974
975         if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
976                 goto fail;
977
978         if (!(argv = unit_full_printf_strv(UNIT(s), c->argv))) {
979                 r = -ENOMEM;
980                 goto fail;
981         }
982
983         r = exec_spawn(c,
984                        argv,
985                        &s->exec_context,
986                        NULL, 0,
987                        s->meta.manager->environment,
988                        true,
989                        true,
990                        true,
991                        s->meta.manager->confirm_spawn,
992                        s->meta.cgroup_bondings,
993                        &pid);
994
995         strv_free(argv);
996         if (r < 0)
997                 goto fail;
998
999         if ((r = unit_watch_pid(UNIT(s), pid)) < 0)
1000                 /* FIXME: we need to do something here */
1001                 goto fail;
1002
1003         *_pid = pid;
1004
1005         return 0;
1006
1007 fail:
1008         unit_unwatch_timer(UNIT(s), &s->timer_watch);
1009
1010         return r;
1011 }
1012
1013 static void socket_enter_dead(Socket *s, bool success) {
1014         assert(s);
1015
1016         if (!success)
1017                 s->failure = true;
1018
1019         socket_set_state(s, s->failure ? SOCKET_MAINTENANCE : SOCKET_DEAD);
1020 }
1021
1022 static void socket_enter_signal(Socket *s, SocketState state, bool success);
1023
1024 static void socket_enter_stop_post(Socket *s, bool success) {
1025         int r;
1026         assert(s);
1027
1028         if (!success)
1029                 s->failure = true;
1030
1031         socket_unwatch_control_pid(s);
1032
1033         s->control_command_id = SOCKET_EXEC_STOP_POST;
1034
1035         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_POST])) {
1036                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1037                         goto fail;
1038
1039                 socket_set_state(s, SOCKET_STOP_POST);
1040         } else
1041                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, true);
1042
1043         return;
1044
1045 fail:
1046         log_warning("%s failed to run 'stop-post' task: %s", s->meta.id, strerror(-r));
1047         socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1048 }
1049
1050 static void socket_enter_signal(Socket *s, SocketState state, bool success) {
1051         int r;
1052         bool sent = false;
1053
1054         assert(s);
1055
1056         if (!success)
1057                 s->failure = true;
1058
1059         if (s->exec_context.kill_mode != KILL_NONE) {
1060                 int sig = (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_FINAL_SIGTERM) ? s->exec_context.kill_signal : SIGKILL;
1061
1062                 if (s->exec_context.kill_mode == KILL_CONTROL_GROUP) {
1063
1064                         if ((r = cgroup_bonding_kill_list(s->meta.cgroup_bondings, sig)) < 0) {
1065                                 if (r != -EAGAIN && r != -ESRCH)
1066                                         goto fail;
1067                         } else
1068                                 sent = true;
1069                 }
1070
1071                 if (!sent && s->control_pid > 0)
1072                         if (kill(s->exec_context.kill_mode == KILL_PROCESS ? s->control_pid : -s->control_pid, sig) < 0 && errno != ESRCH) {
1073                                 r = -errno;
1074                                 goto fail;
1075                         }
1076         }
1077
1078         if (sent && s->control_pid > 0) {
1079                 if ((r = unit_watch_timer(UNIT(s), s->timeout_usec, &s->timer_watch)) < 0)
1080                         goto fail;
1081
1082                 socket_set_state(s, state);
1083         } else if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1084                 socket_enter_stop_post(s, true);
1085         else
1086                 socket_enter_dead(s, true);
1087
1088         return;
1089
1090 fail:
1091         log_warning("%s failed to kill processes: %s", s->meta.id, strerror(-r));
1092
1093         if (state == SOCKET_STOP_PRE_SIGTERM || state == SOCKET_STOP_PRE_SIGKILL)
1094                 socket_enter_stop_post(s, false);
1095         else
1096                 socket_enter_dead(s, false);
1097 }
1098
1099 static void socket_enter_stop_pre(Socket *s, bool success) {
1100         int r;
1101         assert(s);
1102
1103         if (!success)
1104                 s->failure = true;
1105
1106         socket_unwatch_control_pid(s);
1107
1108         s->control_command_id = SOCKET_EXEC_STOP_PRE;
1109
1110         if ((s->control_command = s->exec_command[SOCKET_EXEC_STOP_PRE])) {
1111                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1112                         goto fail;
1113
1114                 socket_set_state(s, SOCKET_STOP_PRE);
1115         } else
1116                 socket_enter_stop_post(s, true);
1117
1118         return;
1119
1120 fail:
1121         log_warning("%s failed to run 'stop-pre' task: %s", s->meta.id, strerror(-r));
1122         socket_enter_stop_post(s, false);
1123 }
1124
1125 static void socket_enter_listening(Socket *s) {
1126         int r;
1127         assert(s);
1128
1129         if ((r = socket_watch_fds(s)) < 0) {
1130                 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1131                 goto fail;
1132         }
1133
1134         socket_set_state(s, SOCKET_LISTENING);
1135         return;
1136
1137 fail:
1138         socket_enter_stop_pre(s, false);
1139 }
1140
1141 static void socket_enter_start_post(Socket *s) {
1142         int r;
1143         assert(s);
1144
1145         if ((r = socket_open_fds(s)) < 0) {
1146                 log_warning("%s failed to listen on sockets: %s", s->meta.id, strerror(-r));
1147                 goto fail;
1148         }
1149
1150         socket_unwatch_control_pid(s);
1151
1152         s->control_command_id = SOCKET_EXEC_START_POST;
1153
1154         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_POST])) {
1155                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0) {
1156                         log_warning("%s failed to run 'start-post' task: %s", s->meta.id, strerror(-r));
1157                         goto fail;
1158                 }
1159
1160                 socket_set_state(s, SOCKET_START_POST);
1161         } else
1162                 socket_enter_listening(s);
1163
1164         return;
1165
1166 fail:
1167         socket_enter_stop_pre(s, false);
1168 }
1169
1170 static void socket_enter_start_pre(Socket *s) {
1171         int r;
1172         assert(s);
1173
1174         socket_unwatch_control_pid(s);
1175
1176         s->control_command_id = SOCKET_EXEC_START_PRE;
1177
1178         if ((s->control_command = s->exec_command[SOCKET_EXEC_START_PRE])) {
1179                 if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1180                         goto fail;
1181
1182                 socket_set_state(s, SOCKET_START_PRE);
1183         } else
1184                 socket_enter_start_post(s);
1185
1186         return;
1187
1188 fail:
1189         log_warning("%s failed to run 'start-pre' task: %s", s->meta.id, strerror(-r));
1190         socket_enter_dead(s, false);
1191 }
1192
1193 static void socket_enter_running(Socket *s, int cfd) {
1194         int r;
1195         DBusError error;
1196
1197         assert(s);
1198         dbus_error_init(&error);
1199
1200         /* We don't take connections anymore if we are supposed to
1201          * shut down anyway */
1202         if (s->meta.job && s->meta.job->type == JOB_STOP) {
1203                 if (cfd >= 0)
1204                         close_nointr_nofail(cfd);
1205                 else  {
1206                         /* Flush all sockets by closing and reopening them */
1207                         socket_close_fds(s);
1208
1209                         if ((r = socket_watch_fds(s)) < 0) {
1210                                 log_warning("%s failed to watch sockets: %s", s->meta.id, strerror(-r));
1211                                 socket_enter_stop_pre(s, false);
1212                         }
1213                 }
1214
1215                 return;
1216         }
1217
1218         if (cfd < 0) {
1219                 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(s->service), JOB_REPLACE, true, &error, NULL)) < 0)
1220                         goto fail;
1221
1222                 socket_set_state(s, SOCKET_RUNNING);
1223         } else {
1224                 char *prefix, *instance = NULL, *name;
1225                 Service *service;
1226
1227                 if (s->n_connections >= s->max_connections) {
1228                         log_warning("Too many incoming connections (%u)", s->n_connections);
1229                         close_nointr_nofail(cfd);
1230                         return;
1231                 }
1232
1233                 if ((r = socket_instantiate_service(s)) < 0)
1234                         goto fail;
1235
1236                 if ((r = instance_from_socket(cfd, s->n_accepted, &instance)) < 0)
1237                         goto fail;
1238
1239                 if (!(prefix = unit_name_to_prefix(s->meta.id))) {
1240                         free(instance);
1241                         r = -ENOMEM;
1242                         goto fail;
1243                 }
1244
1245                 name = unit_name_build(prefix, instance, ".service");
1246                 free(prefix);
1247                 free(instance);
1248
1249                 if (!name) {
1250                         r = -ENOMEM;
1251                         goto fail;
1252                 }
1253
1254                 if ((r = unit_add_name(UNIT(s->service), name)) < 0) {
1255                         free(name);
1256                         goto fail;
1257                 }
1258
1259                 service = s->service;
1260                 s->service = NULL;
1261                 s->n_accepted ++;
1262
1263                 unit_choose_id(UNIT(service), name);
1264                 free(name);
1265
1266                 if ((r = service_set_socket_fd(service, cfd, s)) < 0)
1267                         goto fail;
1268
1269                 cfd = -1;
1270                 s->n_connections ++;
1271
1272                 if ((r = manager_add_job(s->meta.manager, JOB_START, UNIT(service), JOB_REPLACE, true, &error, NULL)) < 0)
1273                         goto fail;
1274         }
1275
1276         return;
1277
1278 fail:
1279         log_warning("%s failed to queue socket startup job: %s", s->meta.id, bus_error(&error, r));
1280         socket_enter_stop_pre(s, false);
1281
1282         if (cfd >= 0)
1283                 close_nointr_nofail(cfd);
1284
1285         dbus_error_free(&error);
1286 }
1287
1288 static void socket_run_next(Socket *s, bool success) {
1289         int r;
1290
1291         assert(s);
1292         assert(s->control_command);
1293         assert(s->control_command->command_next);
1294
1295         if (!success)
1296                 s->failure = true;
1297
1298         socket_unwatch_control_pid(s);
1299
1300         s->control_command = s->control_command->command_next;
1301
1302         if ((r = socket_spawn(s, s->control_command, &s->control_pid)) < 0)
1303                 goto fail;
1304
1305         return;
1306
1307 fail:
1308         log_warning("%s failed to run next task: %s", s->meta.id, strerror(-r));
1309
1310         if (s->state == SOCKET_START_POST)
1311                 socket_enter_stop_pre(s, false);
1312         else if (s->state == SOCKET_STOP_POST)
1313                 socket_enter_dead(s, false);
1314         else
1315                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1316 }
1317
1318 static int socket_start(Unit *u) {
1319         Socket *s = SOCKET(u);
1320
1321         assert(s);
1322
1323         /* We cannot fulfill this request right now, try again later
1324          * please! */
1325         if (s->state == SOCKET_STOP_PRE ||
1326             s->state == SOCKET_STOP_PRE_SIGKILL ||
1327             s->state == SOCKET_STOP_PRE_SIGTERM ||
1328             s->state == SOCKET_STOP_POST ||
1329             s->state == SOCKET_FINAL_SIGTERM ||
1330             s->state == SOCKET_FINAL_SIGKILL)
1331                 return -EAGAIN;
1332
1333         if (s->state == SOCKET_START_PRE ||
1334             s->state == SOCKET_START_POST)
1335                 return 0;
1336
1337         /* Cannot run this without the service being around */
1338         if (s->service) {
1339                 if (s->service->meta.load_state != UNIT_LOADED)
1340                         return -ENOENT;
1341
1342                 /* If the service is alredy actvie we cannot start the
1343                  * socket */
1344                 if (s->service->state != SERVICE_DEAD &&
1345                     s->service->state != SERVICE_MAINTENANCE &&
1346                     s->service->state != SERVICE_AUTO_RESTART)
1347                         return -EBUSY;
1348         }
1349
1350         assert(s->state == SOCKET_DEAD || s->state == SOCKET_MAINTENANCE);
1351
1352         s->failure = false;
1353         socket_enter_start_pre(s);
1354         return 0;
1355 }
1356
1357 static int socket_stop(Unit *u) {
1358         Socket *s = SOCKET(u);
1359
1360         assert(s);
1361
1362         /* Already on it */
1363         if (s->state == SOCKET_STOP_PRE ||
1364             s->state == SOCKET_STOP_PRE_SIGTERM ||
1365             s->state == SOCKET_STOP_PRE_SIGKILL ||
1366             s->state == SOCKET_STOP_POST ||
1367             s->state == SOCKET_FINAL_SIGTERM ||
1368             s->state == SOCKET_FINAL_SIGKILL)
1369                 return 0;
1370
1371         /* If there's already something running we go directly into
1372          * kill mode. */
1373         if (s->state == SOCKET_START_PRE ||
1374             s->state == SOCKET_START_POST) {
1375                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, true);
1376                 return -EAGAIN;
1377         }
1378
1379         assert(s->state == SOCKET_LISTENING || s->state == SOCKET_RUNNING);
1380
1381         socket_enter_stop_pre(s, true);
1382         return 0;
1383 }
1384
1385 static int socket_serialize(Unit *u, FILE *f, FDSet *fds) {
1386         Socket *s = SOCKET(u);
1387         SocketPort *p;
1388         int r;
1389
1390         assert(u);
1391         assert(f);
1392         assert(fds);
1393
1394         unit_serialize_item(u, f, "state", socket_state_to_string(s->state));
1395         unit_serialize_item(u, f, "failure", yes_no(s->failure));
1396         unit_serialize_item_format(u, f, "n-accepted", "%u", s->n_accepted);
1397
1398         if (s->control_pid > 0)
1399                 unit_serialize_item_format(u, f, "control-pid", "%lu", (unsigned long) s->control_pid);
1400
1401         if (s->control_command_id >= 0)
1402                 unit_serialize_item(u, f, "control-command", socket_exec_command_to_string(s->control_command_id));
1403
1404         LIST_FOREACH(port, p, s->ports) {
1405                 int copy;
1406
1407                 if (p->fd < 0)
1408                         continue;
1409
1410                 if ((copy = fdset_put_dup(fds, p->fd)) < 0)
1411                         return copy;
1412
1413                 if (p->type == SOCKET_SOCKET) {
1414                         char *t;
1415
1416                         if ((r = socket_address_print(&p->address, &t)) < 0)
1417                                 return r;
1418
1419                         unit_serialize_item_format(u, f, "socket", "%i %i %s", copy, p->address.type, t);
1420                         free(t);
1421                 } else {
1422                         assert(p->type == SOCKET_FIFO);
1423                         unit_serialize_item_format(u, f, "fifo", "%i %s", copy, p->path);
1424                 }
1425         }
1426
1427         return 0;
1428 }
1429
1430 static int socket_deserialize_item(Unit *u, const char *key, const char *value, FDSet *fds) {
1431         Socket *s = SOCKET(u);
1432         int r;
1433
1434         assert(u);
1435         assert(key);
1436         assert(value);
1437         assert(fds);
1438
1439         if (streq(key, "state")) {
1440                 SocketState state;
1441
1442                 if ((state = socket_state_from_string(value)) < 0)
1443                         log_debug("Failed to parse state value %s", value);
1444                 else
1445                         s->deserialized_state = state;
1446         } else if (streq(key, "failure")) {
1447                 int b;
1448
1449                 if ((b = parse_boolean(value)) < 0)
1450                         log_debug("Failed to parse failure value %s", value);
1451                 else
1452                         s->failure = b || s->failure;
1453
1454         } else if (streq(key, "n-accepted")) {
1455                 unsigned k;
1456
1457                 if ((r = safe_atou(value, &k)) < 0)
1458                         log_debug("Failed to parse n-accepted value %s", value);
1459                 else
1460                         s->n_accepted += k;
1461         } else if (streq(key, "control-pid")) {
1462                 pid_t pid;
1463
1464                 if ((r = parse_pid(value, &pid)) < 0)
1465                         log_debug("Failed to parse control-pid value %s", value);
1466                 else
1467                         s->control_pid = pid;
1468         } else if (streq(key, "control-command")) {
1469                 SocketExecCommand id;
1470
1471                 if ((id = socket_exec_command_from_string(value)) < 0)
1472                         log_debug("Failed to parse exec-command value %s", value);
1473                 else {
1474                         s->control_command_id = id;
1475                         s->control_command = s->exec_command[id];
1476                 }
1477         } else if (streq(key, "fifo")) {
1478                 int fd, skip = 0;
1479                 SocketPort *p;
1480
1481                 if (sscanf(value, "%i %n", &fd, &skip) < 1 || fd < 0 || !fdset_contains(fds, fd))
1482                         log_debug("Failed to parse fifo value %s", value);
1483                 else {
1484
1485                         LIST_FOREACH(port, p, s->ports)
1486                                 if (streq(p->path, value+skip))
1487                                         break;
1488
1489                         if (p) {
1490                                 if (p->fd >= 0)
1491                                         close_nointr_nofail(p->fd);
1492                                 p->fd = fdset_remove(fds, fd);
1493                         }
1494                 }
1495
1496         } else if (streq(key, "socket")) {
1497                 int fd, type, skip = 0;
1498                 SocketPort *p;
1499
1500                 if (sscanf(value, "%i %i %n", &fd, &type, &skip) < 2 || fd < 0 || type < 0 || !fdset_contains(fds, fd))
1501                         log_debug("Failed to parse socket value %s", value);
1502                 else {
1503
1504                         LIST_FOREACH(port, p, s->ports)
1505                                 if (socket_address_is(&p->address, value+skip, type))
1506                                         break;
1507
1508                         if (p) {
1509                                 if (p->fd >= 0)
1510                                         close_nointr_nofail(p->fd);
1511                                 p->fd = fdset_remove(fds, fd);
1512                         }
1513                 }
1514
1515         } else
1516                 log_debug("Unknown serialization key '%s'", key);
1517
1518         return 0;
1519 }
1520
1521 static UnitActiveState socket_active_state(Unit *u) {
1522         assert(u);
1523
1524         return state_translation_table[SOCKET(u)->state];
1525 }
1526
1527 static const char *socket_sub_state_to_string(Unit *u) {
1528         assert(u);
1529
1530         return socket_state_to_string(SOCKET(u)->state);
1531 }
1532
1533 static bool socket_check_gc(Unit *u) {
1534         Socket *s = SOCKET(u);
1535
1536         assert(u);
1537
1538         return s->n_connections > 0;
1539 }
1540
1541 static void socket_fd_event(Unit *u, int fd, uint32_t events, Watch *w) {
1542         Socket *s = SOCKET(u);
1543         int cfd = -1;
1544
1545         assert(s);
1546         assert(fd >= 0);
1547
1548         if (s->state != SOCKET_LISTENING)
1549                 return;
1550
1551         log_debug("Incoming traffic on %s", u->meta.id);
1552
1553         if (events != EPOLLIN) {
1554                 log_error("Got invalid poll event on socket.");
1555                 goto fail;
1556         }
1557
1558         if (w->socket_accept) {
1559                 for (;;) {
1560
1561                         if ((cfd = accept4(fd, NULL, NULL, SOCK_NONBLOCK)) < 0) {
1562
1563                                 if (errno == EINTR)
1564                                         continue;
1565
1566                                 log_error("Failed to accept socket: %m");
1567                                 goto fail;
1568                         }
1569
1570                         break;
1571                 }
1572
1573                 socket_apply_socket_options(s, cfd);
1574         }
1575
1576         socket_enter_running(s, cfd);
1577         return;
1578
1579 fail:
1580         socket_enter_stop_pre(s, false);
1581 }
1582
1583 static void socket_sigchld_event(Unit *u, pid_t pid, int code, int status) {
1584         Socket *s = SOCKET(u);
1585         bool success;
1586
1587         assert(s);
1588         assert(pid >= 0);
1589
1590         if (pid != s->control_pid)
1591                 return;
1592
1593         s->control_pid = 0;
1594
1595         success = is_clean_exit(code, status);
1596
1597         if (s->control_command) {
1598                 exec_status_exit(&s->control_command->exec_status, pid, code, status);
1599
1600                 if (s->control_command->ignore)
1601                         success = true;
1602         }
1603
1604         log_full(success ? LOG_DEBUG : LOG_NOTICE,
1605                  "%s control process exited, code=%s status=%i", u->meta.id, sigchld_code_to_string(code), status);
1606         s->failure = s->failure || !success;
1607
1608         if (s->control_command && s->control_command->command_next && success) {
1609                 log_debug("%s running next command for state %s", u->meta.id, socket_state_to_string(s->state));
1610                 socket_run_next(s, success);
1611         } else {
1612                 s->control_command = NULL;
1613                 s->control_command_id = _SOCKET_EXEC_COMMAND_INVALID;
1614
1615                 /* No further commands for this step, so let's figure
1616                  * out what to do next */
1617
1618                 log_debug("%s got final SIGCHLD for state %s", u->meta.id, socket_state_to_string(s->state));
1619
1620                 switch (s->state) {
1621
1622                 case SOCKET_START_PRE:
1623                         if (success)
1624                                 socket_enter_start_post(s);
1625                         else
1626                                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1627                         break;
1628
1629                 case SOCKET_START_POST:
1630                         if (success)
1631                                 socket_enter_listening(s);
1632                         else
1633                                 socket_enter_stop_pre(s, false);
1634                         break;
1635
1636                 case SOCKET_STOP_PRE:
1637                 case SOCKET_STOP_PRE_SIGTERM:
1638                 case SOCKET_STOP_PRE_SIGKILL:
1639                         socket_enter_stop_post(s, success);
1640                         break;
1641
1642                 case SOCKET_STOP_POST:
1643                 case SOCKET_FINAL_SIGTERM:
1644                 case SOCKET_FINAL_SIGKILL:
1645                         socket_enter_dead(s, success);
1646                         break;
1647
1648                 default:
1649                         assert_not_reached("Uh, control process died at wrong time.");
1650                 }
1651         }
1652 }
1653
1654 static void socket_timer_event(Unit *u, uint64_t elapsed, Watch *w) {
1655         Socket *s = SOCKET(u);
1656
1657         assert(s);
1658         assert(elapsed == 1);
1659         assert(w == &s->timer_watch);
1660
1661         switch (s->state) {
1662
1663         case SOCKET_START_PRE:
1664                 log_warning("%s starting timed out. Terminating.", u->meta.id);
1665                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1666
1667         case SOCKET_START_POST:
1668                 log_warning("%s starting timed out. Stopping.", u->meta.id);
1669                 socket_enter_stop_pre(s, false);
1670                 break;
1671
1672         case SOCKET_STOP_PRE:
1673                 log_warning("%s stopping timed out. Terminating.", u->meta.id);
1674                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGTERM, false);
1675                 break;
1676
1677         case SOCKET_STOP_PRE_SIGTERM:
1678                 log_warning("%s stopping timed out. Killing.", u->meta.id);
1679                 socket_enter_signal(s, SOCKET_STOP_PRE_SIGKILL, false);
1680                 break;
1681
1682         case SOCKET_STOP_PRE_SIGKILL:
1683                 log_warning("%s still around after SIGKILL. Ignoring.", u->meta.id);
1684                 socket_enter_stop_post(s, false);
1685                 break;
1686
1687         case SOCKET_STOP_POST:
1688                 log_warning("%s stopping timed out (2). Terminating.", u->meta.id);
1689                 socket_enter_signal(s, SOCKET_FINAL_SIGTERM, false);
1690                 break;
1691
1692         case SOCKET_FINAL_SIGTERM:
1693                 log_warning("%s stopping timed out (2). Killing.", u->meta.id);
1694                 socket_enter_signal(s, SOCKET_FINAL_SIGKILL, false);
1695                 break;
1696
1697         case SOCKET_FINAL_SIGKILL:
1698                 log_warning("%s still around after SIGKILL (2). Entering maintenance mode.", u->meta.id);
1699                 socket_enter_dead(s, false);
1700                 break;
1701
1702         default:
1703                 assert_not_reached("Timeout at wrong time.");
1704         }
1705 }
1706
1707 int socket_collect_fds(Socket *s, int **fds, unsigned *n_fds) {
1708         int *rfds;
1709         unsigned rn_fds, k;
1710         SocketPort *p;
1711
1712         assert(s);
1713         assert(fds);
1714         assert(n_fds);
1715
1716         /* Called from the service code for requesting our fds */
1717
1718         rn_fds = 0;
1719         LIST_FOREACH(port, p, s->ports)
1720                 if (p->fd >= 0)
1721                         rn_fds++;
1722
1723         if (!(rfds = new(int, rn_fds)) < 0)
1724                 return -ENOMEM;
1725
1726         k = 0;
1727         LIST_FOREACH(port, p, s->ports)
1728                 if (p->fd >= 0)
1729                         rfds[k++] = p->fd;
1730
1731         assert(k == rn_fds);
1732
1733         *fds = rfds;
1734         *n_fds = rn_fds;
1735
1736         return 0;
1737 }
1738
1739 void socket_notify_service_dead(Socket *s) {
1740         assert(s);
1741
1742         /* The service is dead. Dang!
1743          *
1744          * This is strictly for one-instance-for-all-connections
1745          * services. */
1746
1747         if (s->state == SOCKET_RUNNING) {
1748                 log_debug("%s got notified about service death.", s->meta.id);
1749                 socket_enter_listening(s);
1750         }
1751 }
1752
1753 void socket_connection_unref(Socket *s) {
1754         assert(s);
1755
1756         /* The service is dead. Yay!
1757          *
1758          * This is strictly for one-onstance-per-connection
1759          * services. */
1760
1761         assert(s->n_connections > 0);
1762         s->n_connections--;
1763
1764         log_debug("%s: One connection closed, %u left.", s->meta.id, s->n_connections);
1765 }
1766
1767 static void socket_reset_maintenance(Unit *u) {
1768         Socket *s = SOCKET(u);
1769
1770         assert(s);
1771
1772         if (s->state == SOCKET_MAINTENANCE)
1773                 socket_set_state(s, SOCKET_DEAD);
1774
1775         s->failure = false;
1776 }
1777
1778 static const char* const socket_state_table[_SOCKET_STATE_MAX] = {
1779         [SOCKET_DEAD] = "dead",
1780         [SOCKET_START_PRE] = "start-pre",
1781         [SOCKET_START_POST] = "start-post",
1782         [SOCKET_LISTENING] = "listening",
1783         [SOCKET_RUNNING] = "running",
1784         [SOCKET_STOP_PRE] = "stop-pre",
1785         [SOCKET_STOP_PRE_SIGTERM] = "stop-pre-sigterm",
1786         [SOCKET_STOP_PRE_SIGKILL] = "stop-pre-sigkill",
1787         [SOCKET_STOP_POST] = "stop-post",
1788         [SOCKET_FINAL_SIGTERM] = "final-sigterm",
1789         [SOCKET_FINAL_SIGKILL] = "final-sigkill",
1790         [SOCKET_MAINTENANCE] = "maintenance"
1791 };
1792
1793 DEFINE_STRING_TABLE_LOOKUP(socket_state, SocketState);
1794
1795 static const char* const socket_exec_command_table[_SOCKET_EXEC_COMMAND_MAX] = {
1796         [SOCKET_EXEC_START_PRE] = "StartPre",
1797         [SOCKET_EXEC_START_POST] = "StartPost",
1798         [SOCKET_EXEC_STOP_PRE] = "StopPre",
1799         [SOCKET_EXEC_STOP_POST] = "StopPost"
1800 };
1801
1802 DEFINE_STRING_TABLE_LOOKUP(socket_exec_command, SocketExecCommand);
1803
1804 const UnitVTable socket_vtable = {
1805         .suffix = ".socket",
1806
1807         .init = socket_init,
1808         .done = socket_done,
1809         .load = socket_load,
1810
1811         .coldplug = socket_coldplug,
1812
1813         .dump = socket_dump,
1814
1815         .start = socket_start,
1816         .stop = socket_stop,
1817
1818         .serialize = socket_serialize,
1819         .deserialize_item = socket_deserialize_item,
1820
1821         .active_state = socket_active_state,
1822         .sub_state_to_string = socket_sub_state_to_string,
1823
1824         .check_gc = socket_check_gc,
1825
1826         .fd_event = socket_fd_event,
1827         .sigchld_event = socket_sigchld_event,
1828         .timer_event = socket_timer_event,
1829
1830         .reset_maintenance = socket_reset_maintenance,
1831
1832         .bus_message_handler = bus_socket_message_handler
1833 };